Loading...
Please wait, while we are loading the content...
Similar Documents
A trust-based access control model for pervasive computing applications.
| Content Provider | CiteSeerX |
|---|---|
| Author | Toahchoodee, Manachai Abdunabi, Ramadan Ray, Indrakshi Ray, Indrajit |
| Abstract | Abstract. With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. In this work, we propose a trust based approach for access control for pervasive computing systems. Our previously proposed belief based trust model is used to evaluate the trustworthiness of users. Fine-grained access control is achieved depending on the trust levels of users. We develop a class of trust-based access control models having very formal semantics, expressed in graph theory. The models differ with respect to the features they provide, and the types of the trust constraints that they can support. 1 |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Trust-based Access Control Model Pervasive Computing Application Access Control Rapid Growth Fine-grained Access Control Trust Level Trust Model Graph Theory Trust Constraint Pervasive Computing Wireless Network Mobile Device Formal Semantics |
| Content Type | Text |
| Resource Type | Article |